Security Terminology Demystified: Phishing

Security Terminology Demystified: Phishing

Oh no! The bank is about to close my overdraft! I should definitely click on this link and get this sorted out … Stop. Don’t click on the link. Don’t open the attachment. Don’t fill in those details. And definitely don’t hand over your personal information. When...

Users still the weakest link in the IT security strategy

Cyber security threats are constantly evolving but one remains the same – users. When asked whether users really are still the weakest link in companies’ cyber security defence strategy, Michael Morton, Solutions Architect at Securicom, says: “Yes,...

How can companies protect themselves from future ransomware attacks?

The recent ransomware attack on Johannesburg power utility City Power shows how easy it is for organisations to fall victim to cybercriminals, who often carry out attacks that are financially motivated. By Lukas van der Merwe, specialist sales executive: security at...
Security Terminology Demystified: The Botnet

Security Terminology Demystified: The Botnet

You are now part of a collective, controlled by an unseen presence and forced to do their bidding … In our comprehensive guide to all the security threats that are out on the market today we listed some of the most virulent and one of these is the botnet. A...

Data security in the age of the cloud

With IT spending in South Africa on the increase and organisations increasingly turning to the cloud to host their data, cybersecurity must remain a strategic priority. And so it has become less about the technical capabilities of protection and more about...

Access control is paramount for data security in the cloud

Companies are increasingly shifting IT services and applications to the cloud to be readily available to employees, empowering their productivity from wherever they are and from any device. Moving critical business information to the cloud does come with security...